期刊文献+

一种基于数据挖掘的拒绝服务攻击检测技术 被引量:46

A Data-Mining Based DoS Detection Technique
在线阅读 下载PDF
导出
摘要 提出了一种新的、基于数据挖掘的DoS攻击检测技术———DMDoSD,它首先利用Apriori关联算法从原始网络数据中提取流量特征,然后利用K-means聚类算法自适应地产生检测模型,这两种算法的结合能够实时地、自动地、有效地检测DoS攻击.DMDoSD除了向现有的IDS发出攻击报警外,还进一步利用关联算法分析异常网络数据包,确定攻击特征,为DoS攻击的防御提供支持. Denial of Service (DOS) is a type of frequent network attack which can severely impact the availability of networks and services. DoS usually utilizes packet attribute spoof techniques to confuse present IDSs such as snort. Typically, the spoof techniques minimize effective and automatic DoS attacks detection. A novel technique based on data mining to detect DoS attacks in real-time called DMDoSD is presented. First, the Apriori association algorithm extracts traffic patterns from empirical network data and subsequently the K-means cluster algorithm adaptively generates a detection model. By combining these two algorithms, DoS attacks can be detected swiftly, automatically and effectively as they arise. In addition to the alerts typically sent out by IDSs, DMDoSD also determines signatures of malicious packets automatically to help to react to DoS attaeks.
出处 《计算机学报》 EI CSCD 北大核心 2006年第6期944-951,共8页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目(2001AA144050 2003AA144050)资助
关键词 拒绝服务攻击 聚类算法 关联算法 实时检测 DoS(Denial of Service) attack cluster algorithm association algorithm real-time detection
  • 相关文献

参考文献14

  • 1SkoudisEd.反击黑客[M].北京:机械工业出版社,2002..
  • 2CERT/CC Coordination Center.Trends in Denial of Service Attack Technology.October 2001
  • 3Honig A.,Howard A.,Eskin E.,Stolfo S..Adaptive model generation:An architecture for the deployment of data miningbased intrusion detection systems.Data Mining for Security Applications,Kluwer,2002
  • 4韩家炜等.数据挖掘-概念与技术.北京:高等教育出版社,2001
  • 5Portnoy L.,Eskin E.,Stolfo S.J..Intrusion detection with unlabeled data using clustering.In:Proceedings of the ACM CSS Workshop on Data Mining Applied to Security (DMSA,2001),Philadelphia,PA,2001
  • 6Ertoz L.,Eilertson E.,Lazarevic A.,Tan P.,Dokas P.,Srivastava J.,Kumar.Detection and summarization of novel network attacks using data mining.Technical Report,2003
  • 7The 1999 DARPA Intrusion Detection Evaluation Data set,Information Systems Technology Group of MIT Lincoln Laboratory,http://www.ll.mit.edu/IST/ideval/data/data_index.html
  • 8Mohiuddin S.,Hershkop S.,Bhan R.,Stofo S..Defending against a large scale denial-of-service attack.In:Proceedings of the IEEE.Workshop on Information Assurance and Security,New York,2002
  • 9Barbara D..ADAM:Detecting intrusions by data mining.In:Proceedings of the 2001 IEEE.Workshop on Information Assurance and Security,2001
  • 10Staniford S.,Hoagland J.,McAlerney J..Practical automated detection of stealthy portscans.Journal of Computer Security,2002,10(1/2):105~136

共引文献1

同被引文献348

引证文献46

二级引证文献178

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部